Description
Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Published: 2026-05-14
Score: 8.3 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A use‑after‑free flaw exists in the core of Google Chrome on Windows, allowing a remote attacker who has already compromised the renderer to execute arbitrary code by loading a specially crafted HTML page. The weakness is classified as CWE‑416, which describes memory safety failure due to accessing freed memory, and CWE‑825, which relates to uninitialized memory or data read. The primary impact of this vulnerability is the potential for a sandbox escape that can lead to full system compromise if the attacker can gain sufficient privileges.

Affected Systems

Google Chrome for Windows versions prior to 148.0.7778.168 are affected. Users running older builds of Chrome on Windows may be vulnerable until they upgrade to the patched release. No other operating systems or platforms are listed as affected in the current advisory.

Risk and Exploitability

The vulnerability has a CVSS score of 8.3, indicating high severity, and is not listed in the CISA KEV catalog. The Chromium risk assessment rates it as medium severity. The likely attack vector involves a remote attacker who already bypassed the initial rendering sandbox; this requires the attacker to have access to the renderer process, possibly through social engineering or cross‑site scripting. Because the vulnerability is a use‑after‑free, exploitation demands precise timing and memory layout, which raises the technical barrier. Nonetheless, once a renderer process is compromised, the attack path to full code execution becomes available and can affect the confidentiality, integrity, and availability of the compromised system.

Generated by OpenCVE AI on May 15, 2026 at 13:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Google Chrome to version 148.0.7778.168 or newer to remove the use‑after‑free bug.
  • If immediate update is not feasible, temporarily block or prevent the use of the vulnerable Chrome build through corporate update policies or static rule sets.
  • Maintain up‑to‑date endpoint protection and monitor for anomalous HTML‑rendering activity that could indicate exploitation attempts.

Generated by OpenCVE AI on May 15, 2026 at 13:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6273-1 chromium security update
History

Fri, 15 May 2026 12:15:00 +0000

Type Values Removed Values Added
Title Remote Sandbox Escape via Use‑After‑Free in Chrome Windows chromium-browser: chromium-browser: Use after free in Core
Weaknesses CWE-825
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 14 May 2026 22:15:00 +0000

Type Values Removed Values Added
Title Remote Sandbox Escape via Use‑After‑Free in Chrome Windows
First Time appeared Google
Google chrome
Vendors & Products Google
Google chrome

Thu, 14 May 2026 21:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 14 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
Weaknesses CWE-416
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Chrome

Published:

Updated: 2026-05-15T03:57:11.663Z

Reserved: 2026-05-14T05:40:25.388Z

Link: CVE-2026-8574

cve-icon Vulnrichment

Updated: 2026-05-14T21:03:50.584Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-14T20:17:19.727

Modified: 2026-05-14T22:16:50.903

Link: CVE-2026-8574

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-14T19:52:37Z

Links: CVE-2026-8574 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-15T13:45:16Z

Weaknesses